Context: Smartphones with biometrics, like facial recognition, are becoming the norm. But not everyone is running out to get the latest device that uses this type of technology—even if it does help protect their privacy.

Context: In the latest episode of eMarketer’s “Behind the Numbers” podcast, the topic is “Big Tech.” Once beloved, major tech brands now face a backlash. What are the implications for the platforms amidst potential political, regulatory and consumer pressures?

Context: Fingerprint recognition; Use it regularly; Have used it once or twice; Heard of it but havent used it; Never heard of it; Voice recognition; Behavioral biometrics; Facial recognition; Eye scan; Vein pattern recognition

Context: Fingerprint recognition; Use it regularly; Have used it once or twice; Heard of it but havent used it; Never heard of it; Voice recognition; Facial recognition; Behavioral biometrics; Eye scan; Vein pattern
recognition

Context: Business and IT misalignment; Legacy infrastructure and systems; Resources and budget allocation; Integrating siloed applications and data; Lack of internal skills and knowledge; Lack of board management buy in

Context: Meeting regulatory compliance and internal audit requirements; Challenging to identify anomalies and trends to optimize use; Not confident in exposures that increase our security risk profile; Lack visibility into cloud usage accounts costs etc; Cloud spending is not predictable; Lack consistent policies and governance; Difficult to allocate costs correctly; We dont leverage expertise between teams or share best practices; No tracking or controls to turn off unused services for cost or security reasons; No consistent metrics to track success; We spend too much money on cloud for the value received; We do not face any challenges with public cloud adoption

Context: Top factor; nd factor; rd factor; New disruptive market entrants; Ease of substitution of one product or service for another in the customers eyes; New products and services causing market fragmentation; More established high tech vendors adding disruptive technologies to their portfolio within your local market; Operational excellence eg time to market; Greater customer bargaining power; Variations in customer value proposition and response of competition in local markets; Consolidation with mergers and acquisitions

Context: A security breachsomeone hacking into your companys computer system; Your companys computers becoming damaged or going down; Someone gaining access to your companys banking accounts or financial control system; The potential for theft or loss of control of your companys customer or client records; Employees putting information systems at risk through unsafe computing practices or using personal devices for company business; Remote access or hacking into supervisory or industrial control systems or other business operational software systems; Having the resources and know how to recover from data related breaches; A shortage of skilled cybersecurity talent that can keep ahead of cyber threats; Your company being a victim of cyber extortion; Using online cloud storage for your companys data or information; Someone using email or other social engineering techniques to fool employees into transferring company funds erroneously

Context: Artificial intelligence is still in its early stages, but is finally starting to show results. Powerful algorithms, combined with big data and cloud solutions, are helping companies in many industries bring scale, speed and precision to marketing operations.